- Information Security
- VAPT
- SIEM
- McAfee Nitro
- Splunk
- UF-Installation on Linux
- UF-Installation on Windows
- Splunk Instance Installation
- UF & Receiver Configuration
- HF & Receiver Configuration
- Deployment Server & Client Configuration
- Distributed Search Setup
- Indexer Clustering
- Search Head Clustering
- SH Clustering with Non-clustered Indexer
- SH Clustering with Clustered Indexer
- Splunk Fundamental 1
- Splunk Fundamental 2
- Regular Expression
- Computer Networking
- TCP/IP Vs OSI
- Networking Fundamentals
- Subnetting
- About CISCO Router
- Layer-2 Switching
- Virtual LAN
- Trunking
- Inter VLAN
- Extended & Voice VLAN
- VLAN Trunking Protocol
- Spanning Tree Protocol
- Ether Channel
- Layer-3 Routing
- Static Routing
- Default Routing
- Routing Information Protocol
- Enhanced Interior Gateway Routing Protocol
- Open Shortest Path First
- Access Control List
- Network/Port Address Translation
- WAN Technologies
- Leased Lines
- Frame Relay
- Metro-Ethernet
- Multi Protocol Label Switching
- Virtual Private Network
- Cyber Security Attacks
- WAPT
- Information Gathering(WEB)
- Cookies & Session Management
- SQL Injection
- Cross Site Scripting
- Cross Site Request Forgery
- Insecure Direct Object Request
- Command Injection
- HTML Injection
- File Upload
- URL Redirection
- Local & Remote File Inclusion
- HTTP Authentication
- Web Shells
- Encoding Methods
- Firefox Addons
- Python
- CTF Challenge
UDP HEADER
Source Port: The port of a source host
Destination Port: The port of a destination host
Length: Total length of header and data
Checksum: Before a packet is sent, TCP runs both its header and data through a specific algorithm to arrive a checksum value, which is placed in the checksum field. When the receiver gets, it runs through the same algorithm. If the value matches, it accepts. If not it drops the packet.
For UDP, it is optional. For TCP, it is mandatory.